Infrastructure tutorials
Production-grade guides for Linux, servers, security and performance. Copy-paste commands, multi-distro support, written by engineers who run this in production.
Browse by topic
Linux
System administration, shell scripting, package management
Hosting & Servers
Web servers, reverse proxies, SSL, domains
Security
Firewalls, hardening, encryption, access control
Performance
Caching, optimization, profiling, load testing
Databases
MySQL, PostgreSQL, Redis, backups, replication
Networking
DNS, load balancing, VPN, TCP/IP, routing
DevOps
CI/CD, Docker, Kubernetes, automation
Monitoring
Logging, alerting, metrics, observability
Most viewed
Configure Linux system time synchronization with chrony and NTP hardening
linuxSet up Node.js application security with Helmet and rate limiting
securityInstall and configure Caddy web server with automatic HTTPS and reverse proxy
hostingInstall and configure Uvicorn ASGI server with systemd and reverse proxy for FastAPI applications
hostingInstall and configure PostgreSQL 17 with performance tuning and security hardening
databasesRecently published
Configure systemd service resource limits and security isolation
linuxConfigure NGINX SSL termination with Redis session storage
hostingConfigure intrusion detection with OSSEC and fail2ban integration
securitySet up Varnish 7 cluster with load balancing across multiple backends
performanceConfigure OSSEC active response for automated threat blocking
securityConfigure Redis backup encryption with GPG for secure automated backups
Set up encrypted Redis backups using GPG keys with automated scheduling through systemd timers. This tutorial covers GPG key management, backup script creation, and secure restoration procedures for production Redis environments.
Configure Kubernetes pod disruption budgets for high availability with policy enforcement
Learn to configure PodDisruptionBudget resources in Kubernetes to maintain application availability during voluntary disruptions. This tutorial covers creating disruption budgets, implementing policies for different workload types, and monitoring disruption events with kubectl.
Configure SonarQube LDAP authentication with Active Directory and user group management
Set up SonarQube to authenticate users against Active Directory using LDAP. Configure automatic user provisioning, group synchronization, and role-based access control for enterprise environments with centralized authentication.
Implement MinIO data lifecycle management and automated archival with S3 retention policies
Configure MinIO lifecycle policies to automatically transition and expire objects based on age and storage class. Set up intelligent tiering and automated archival to optimize storage costs and compliance with data retention requirements.
Set up Elasticsearch 8 cross-cluster replication for disaster recovery and high availability
Configure Elasticsearch 8 cross-cluster replication (CCR) to replicate indices across multiple clusters for disaster recovery. This tutorial covers security setup, remote cluster connections, replication policies, and automated failover procedures.
Configure MinIO high availability clustering for production with multi-node setup and automatic failover
Set up a production-ready MinIO cluster with multiple nodes, erasure coding, and automatic failover. This tutorial covers distributed mode configuration, load balancing with SSL termination, and health monitoring for enterprise object storage.
Configure advanced Consul ACL policies for production security hardening
Set up comprehensive Consul Access Control Lists with bootstrap tokens, role-based permissions, and secure inter-node communication for production environments. This tutorial covers ACL system initialization, policy creation, and agent token configuration.
Configure SSL encryption and authentication for ClamAV cluster with high availability scanning
Set up a secure ClamAV cluster with SSL/TLS encryption, certificate-based authentication, and load balancing for enterprise-grade antivirus scanning. This tutorial covers SSL certificate generation, encrypted inter-node communication, and HAProxy SSL termination.
Implement MinIO security hardening with IAM policies and audit logging
Secure your MinIO object storage with comprehensive IAM policies, role-based access control, and audit logging for compliance monitoring. This tutorial covers user management, policy creation, and security validation for production environments.
Configure Vault auto-unseal with AWS KMS for high availability secrets management
Set up HashiCorp Vault with AWS KMS auto-unseal to eliminate manual unsealing processes and enable high availability deployments with automatic recovery.
Integrate Consul with Kubernetes service discovery and automatic configuration
Set up Consul for dynamic service discovery in Kubernetes clusters with automatic service registration, health checks, and configuration management for microservices orchestration.
Setup Kubernetes Ingress NGINX with cert-manager for automated SSL certificates
Learn to deploy NGINX Ingress Controller with cert-manager for automatic SSL certificate provisioning and renewal using Let's Encrypt in production Kubernetes clusters.
Need help?
Don't want to manage this yourself?
We handle infrastructure for businesses that depend on uptime. From initial setup to ongoing operations.
Talk to an engineer